Company Details
iagility
3
362
51125
iagility.fr
0
IAG_1418874
In-progress

IAgility Company CyberSecurity Posture
iagility.frIAgility Propose des solutions et services innovants destinés à optimiser l'Expérience, la gestion et la relation Client. Nous intégrons des solutions de communications et d'interactions à valeur ajoutée, financés par une nouvelle approche entre les systèmes d'informations, les applications professionnelles et les infrastructures réseaux et télécoms. Nous sommes spécialisés sur les métiers du centre d'appels, et pourtant, nous répondons aussi bien sur les grands-comptes que les administrations, pour des projets de taille et de complexité variables. Opérateur de télécom et réseaux international, nous couvrons plus de 170 pays. Avec plus de 1200 Clients et plus de 250 sites connectés à nos infra réseaux (voix/data), IAgility vous fait bénéficier de son expérience dans le conseil, l'intégration et le suivi opérationnel des meilleurs solutions mondiales reconnues. Après avoir travaillé, et intégré la plupart des solutions du marché, nous avons choisi pour vous...
Company Details
iagility
3
362
51125
iagility.fr
0
IAG_1418874
In-progress
Between 750 and 799

IAgility Global Score (TPRM)XXXX



No incidents recorded for IAgility in 2025.
No incidents recorded for IAgility in 2025.
No incidents recorded for IAgility in 2025.
IAgility cyber incidents detection timeline including parent company and subsidiaries

IAgility Propose des solutions et services innovants destinés à optimiser l'Expérience, la gestion et la relation Client. Nous intégrons des solutions de communications et d'interactions à valeur ajoutée, financés par une nouvelle approche entre les systèmes d'informations, les applications professionnelles et les infrastructures réseaux et télécoms. Nous sommes spécialisés sur les métiers du centre d'appels, et pourtant, nous répondons aussi bien sur les grands-comptes que les administrations, pour des projets de taille et de complexité variables. Opérateur de télécom et réseaux international, nous couvrons plus de 170 pays. Avec plus de 1200 Clients et plus de 250 sites connectés à nos infra réseaux (voix/data), IAgility vous fait bénéficier de son expérience dans le conseil, l'intégration et le suivi opérationnel des meilleurs solutions mondiales reconnues. Après avoir travaillé, et intégré la plupart des solutions du marché, nous avons choisi pour vous...

EchoStar Corporation (Nasdaq: SATS) is a premier provider of technology, networking services, television entertainment and connectivity, offering consumer, enterprise, operator and government solutions worldwide under its EchoStar®, Boost Mobile®, Sling TV, DISH TV, Hughes®, HughesNet®, HughesON™ an

Bharti Enterprises is one of India’s leading business group with diversified interests in telecom, financial services, real estate, hospitality, agri and food. Bharti has been a pioneering force in the Indian telecom sector with many firsts and innovations to its credit. Bharti Airtel, the group's
Our 15 000 talented colleagues serve millions of customers every day in one of the world’s most connected regions. With a strong connectivity base, we’re the hub in the digital ecosystem, empowering people, companies and societies to stay in touch with everything that matters 24/7/365 - on their ter

Telcel (Radiomóvil Dipsa) es subsidiaria de América Móvil, uno de los mayores proveedores de comunicaciones celulares de Latinoamérica, grupo líder con inversiones en telecomunicaciones en varios países del continente americano. Telcel es la empresa de telefonía celular líder en México. Nuestra s
Charter Communications, Inc. (NASDAQ: CHTR) is a leading broadband connectivity company and cable operator with services available to more than 57 million homes and businesses in 41 states through its Spectrum brand. Over an advanced communications network, the company offers a full range of state-o

Vodafone Idea Limited is an Aditya Birla Group and Vodafone Group partnership. It is India’s leading telecom service provider. The Company provides pan India Voice and Data services across 2G, 3G and 4G platform. With the large spectrum portfolio to support the growing demand for data and voice, the
.png)
ARTIFICIAL intelligence (AI) is reshaping the world, with both promise and peril. While Malaysia's ambition to lead in AI innovation is...
The looming arrival of quantum computing presents a fundamental threat to modern cybersecurity, potentially rendering current encryption...
In March, we reported on Vancouver-based INETCO partnering with Brazilian IT firm Agility and payment processor Elo to enhance security and...
Access Bank (Ghana) PLC held its 17th Annual General Meeting (AGM) on Friday, June 20, 2025, at the Bank's Head Office in Accra,...
French business and technology consulting company Audensiel has acquired Montréal-based digital consultancy Maltem Canada for an undisclosed...
Candor Technology has announced a new addition to its executive team. Industry veteran Eric Rawlings (pictured) will take on the position of chief technology...
Explore how AI-powered cryptographic agility is revolutionizing cybersecurity, helping organizations navigate complex digital threats.
Jason Witty, head of cybersecurity and technology controls, and global chief information security officer for JPMorgan Chase, says security...
Enterprise Network Equipment Market Analysis, By Product Type (Routers, Switches, WLAN Equipment, Network Security Equipment, Network Management Tools,...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of IAgility is http://www.iagility.fr.
According to Rankiteo, IAgility’s AI-generated cybersecurity score is 750, reflecting their Fair security posture.
According to Rankiteo, IAgility currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, IAgility is not certified under SOC 2 Type 1.
According to Rankiteo, IAgility does not hold a SOC 2 Type 2 certification.
According to Rankiteo, IAgility is not listed as GDPR compliant.
According to Rankiteo, IAgility does not currently maintain PCI DSS compliance.
According to Rankiteo, IAgility is not compliant with HIPAA regulations.
According to Rankiteo,IAgility is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
IAgility operates primarily in the Computer Networking Products industry.
IAgility employs approximately 3 people worldwide.
IAgility presently has no subsidiaries across any sectors.
IAgility’s official LinkedIn profile has approximately 362 followers.
IAgility is classified under the NAICS code 51125, which corresponds to Software Publishers.
No, IAgility does not have a profile on Crunchbase.
Yes, IAgility maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/iagility.
As of November 28, 2025, Rankiteo reports that IAgility has not experienced any cybersecurity incidents.
IAgility has an estimated 949 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, IAgility has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint
Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.
Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.